Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    a634052144ca4c55b40b8a317b87b96ee607247fabc2be5147b4366f68736343.exe

  • Size

    416KB

  • Sample

    241112-nd531szras

  • MD5

    a900e5b935fb234ab80949e8f294fcff

  • SHA1

    d640f06b8b1470fc0d2011805258b9af0b7612f2

  • SHA256

    a634052144ca4c55b40b8a317b87b96ee607247fabc2be5147b4366f68736343

  • SHA512

    8c30347773d7d058fde8f1371914715e902d924941794e20a5a101ff3447192eb63b97eeb7d552f0223c6831f0bc94beb4b140ce9e553eee0a84b40b5630fb2a

  • SSDEEP

    6144:ITNE3ZRrnaBVlvphVxmP+6CiejgcME1cwYfU+va+RU7o:ITNYrnE3bm/CiejewY5vH

Malware Config

Extracted

Family

nanocore

Version

1.2.2.0

C2

asporturizm@ddns.net:46218

178.32.224.116:46218

Mutex

4af74541-e3f1-469c-8af7-efe4071b81cf

Attributes
  • activate_away_mode

    false

  • backup_connection_host

    178.32.224.116

  • backup_dns_server

  • buffer_size

    65535

  • build_time

    2018-07-28T12:59:38.488799236Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    false

  • clear_zone_identifier

    false

  • connect_delay

    4000

  • connection_port

    46218

  • default_group

    tourex

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    4af74541-e3f1-469c-8af7-efe4071b81cf

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    asporturizm@ddns.net

  • primary_dns_server

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    true

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Targets

    • Target

      a634052144ca4c55b40b8a317b87b96ee607247fabc2be5147b4366f68736343.exe

    • Size

      416KB

    • MD5

      a900e5b935fb234ab80949e8f294fcff

    • SHA1

      d640f06b8b1470fc0d2011805258b9af0b7612f2

    • SHA256

      a634052144ca4c55b40b8a317b87b96ee607247fabc2be5147b4366f68736343

    • SHA512

      8c30347773d7d058fde8f1371914715e902d924941794e20a5a101ff3447192eb63b97eeb7d552f0223c6831f0bc94beb4b140ce9e553eee0a84b40b5630fb2a

    • SSDEEP

      6144:ITNE3ZRrnaBVlvphVxmP+6CiejgcME1cwYfU+va+RU7o:ITNYrnE3bm/CiejewY5vH

    • NanoCore

      NanoCore is a remote access tool (RAT) with a variety of capabilities.

    • Nanocore family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.